PART 1: Exam 220-1001 Domain 1.0: Mobile Devices Module 1.1: Given a scenario, install and configure laptop hardware and components. Module 1.2: Given a scenario, install components within the display of a laptop. Module 1.3: Given a scenario, use appropriate laptop features. Module 1.
4: "Compare and contrast characteristics of varioustypes of other mobile devices." Module 1.5: Given a scenario, connect and configure accessories and ports of other mobile devices. Module 1.6: Given a scenario, configure basic mobile device network connectivity and application support. Module 1.7: Given a scenario, use methods to perform mobile device synchronization. Domain 2.
0: Networking Module 2.1: Compare and contrast TCP and UDP ports, protocols, and their purposes. Module 2.2: Compare and contrast common networking hardware devices. Module 2.3: Given a scenario, install and configure a basic wired/wireless SOHO network. Module 2.4: Compare and contrast wireless networking protocols.
Module 2.5: Summarize the properties and purposes of services provided by networked hosts. Module 2.6: Explain common network configuration concepts. Module 2.7: Compare and contrast Internet connection types, network types, and their features. Module 2.8: Given a scenario, use appropriate networking tools.
Domain 3.0: Hardware Module 3.1: Explain basic cable types, features, and their purposes. Module 3.2: Identify common connector types. Module 3.3: Given a scenario, install RAM types. Module 3.
4: Given a scenario, select, install and configure storage devices. Module 3.5: Given a scenario, install and configure motherboards, CPUs, and add-on cards. Module 3.6: Explain the purposes and uses of various peripheral types. Module 3.7: Summarize power supply types and features. Module 3.
8: Given a scenario, select and configure appropriate components for a custom PC configuration to meet customer specifications or needs. Module 3.9: Given a scenario, install and configure common devices. Domain 4.0: Virtualization and Cloud Computing Module 4.1: Compare and contrast cloud computing concepts. Module 4.2: Given a scenario, set up and configure client-side virtualization.
Domain 5.0: Hardware and Netowrk Troubleshooting Module 5.1: Given a scenario, use the best practice methodology to resolve problems. Module 5.2: Given a scenario, troubleshoot problems related to motherboards, RAM, CPUs, and power. Module 5.3: Given a scenario, troubleshoot hard drives and RAID arrays. Module 5.
4: Given a scenario, troubleshoot video, projector, and display issues. Module 5.5: Given a scenario, troubleshoot common mobile device issues while adhering to the appropriate procedures. Module 5.6: Given a scenario, troubleshoot printers. Module 5.7: Given a scenario, troubleshoot common wired and wireless network problems. PART 2: Exam 220-1002 Domain 1.
0: Operating Systems Module 1.1: Compare and contrast common operating system types and their purposes. Module 1.2: Compare and contrast features of Microsoft Windows versions. Module 1.3: Summarize general OS installation considerations and upgrade methods. Module 1.4: Given a scenario, use appropriate Microsoft command line tools.
Module 1.5: Given a scenario, use Microsoft operating system features and tools. Module 1.6: Given a scenario, use Microsoft Windows Control Panel utilities. Module 1.7: Summarize application installation and configuration concepts. Module 1.8: Given a scenario, configure Microsoft Windows networking on a client/desktop.
Module 1.9: Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating systems. Domain 2.0: Security Module 2.1: Summarize the importance of physical security measures. Module 2.2: Explain logical security concepts. Module 2.
3: Compare and contrast wireless security protocols and authentication methods. Module 2.4: Given a scenario, detect, remove, and prevent malware using appropriate tools and methods. Module 2.5: Compare and contrast social engineering, threats, and vulnerabilities. Module 2.6: Compare and contrast the differences of basic Microsoft Windows OS security settings. Module 2.
7: Given a scenario, implement security best practices to secure a workstation. Module 2.8: Given a scenario, implement methods for securing mobile devices. Module 2.9: Given a scenario, implement appropriate data destruction and disposal methods. Module 2.10: Given a scenario, configure security on SOHO wireless and wired networks. Domain 3.
0: Software Troubleshooting Module 3.1: Given a scenario, troubleshoot Microsoft Windows OS problems. Module 3.2: Given a scenario, troubleshoot and resolve PC security issues. Module 3.3: Given a scenario, use best practice procedures for malware removal. Module 3.4: Given a scenario, troubleshoot mobile OS and application issues.
Module 3.5: Given a scenario, troubleshoot mobile OS and application security issues. Domain 4.0: Operational Procedures Module 4.1: Compare and contrast best practices associated with types of documentation. Module 4.2: Given a scenario, implement basic change management best practices. Module 4.
3: Given a scenario, implement basic disaster prevention and recovery methods. Module 4.4: Explain common safety procedures. Module 4.5: Explain environmental impacts and appropriate controls. Module 4.6: Explain the processes for addressing prohibited content/activity, and privacy, licensing, and policy concepts. Module 4.
7: Given a scenario, use proper communication techniques and professionalism. Module 4.8: Identify the basics of scripting. Module 4.9: Given a scenario, use remote access technologies. Glossary.